13.07.2015 Views

Successful Implementation of the Hill and Magic Square Ciphers: A ...

Successful Implementation of the Hill and Magic Square Ciphers: A ...

Successful Implementation of the Hill and Magic Square Ciphers: A ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

International Journal <strong>of</strong> Advanced Computer Technology (IJACT)ISSN:2319-7900For singly-even, n = 6, pair numbers satisfying T can bedetermined as 2*4 +2+8 = 18 <strong>and</strong> hence for singly-even, n =10, pair numbers satisfying T can be determined as 24WMS-6Different weak magic squares formed assuming centralblock with <strong>the</strong> pair-numbers [13, 24] <strong>and</strong> [18, 19] in differentpositions:WMS-1WMS-2WMS-3WMS-4WMS-534 9 16 21 27 4 1112 29 17 14 11 32 10531 30 24 18 7 1 1116 12 19 13 25 36 1115 26 20 23 8 35 11733 10 15 22 28 3 111111 116 111 111 106 111 11134 9 16 21 27 4 1112 29 23 14 11 32 11131 30 24 18 7 1 1116 12 19 13 25 36 1115 26 20 17 8 35 10533 10 15 22 28 3 111111 116 117 105 106 111 11134 9 22 15 27 4 1112 29 17 14 11 32 10536 25 13 19 12 6 1111 7 18 24 30 31 1115 26 20 23 8 35 11733 10 21 16 28 3 111111 106 111 111 116 111 11134 9 22 15 27 4 1112 29 23 14 11 32 11136 25 13 19 12 6 1111 7 18 24 30 31 1115 26 20 17 8 35 11133 10 21 16 28 3 111111 106 117 105 116 111 11134 9 16 21 27 4 1112 29 17 20 11 32 11131 30 18 13 12 1 1056 7 24 19 25 36 1175 26 14 23 8 35 11133 10 22 15 28 3 111111 111 111 111 111 111 11134 9 16 21 27 4 1112 29 17 20 11 32 111The above illustrations shows that different forms <strong>of</strong>weak magic squares can be generated, depending upon <strong>the</strong>choice <strong>of</strong> central block <strong>and</strong> assignment <strong>of</strong> pair-numbers satisfyingT in different positions.4. IllustrationsIllustration 1: Using 5 selected dummy letters, <strong>the</strong> messageSEA SE a corresponds to plaintext <strong>of</strong> [ 18 27]37 Let <strong>the</strong> matrix A= A = 1 ≠ 0 <strong>and</strong> A -1 exists512 Encryption: 3 7 * 18 243mod31 512 mod31 2741426 represents <strong>the</strong> ciphertext, [A o L]11Decryption A -1 =12 7 5 3Now, A -1 C =12 726* mod 31235 mod 315 311 97 18 giving <strong>the</strong> original plaintext <strong>of</strong> SEa or SEA 27Illustration 2: Consider <strong>the</strong> message HOUR representedas HO u R corresponds to <strong>the</strong> plaintext <strong>of</strong> [7 30 17]Let <strong>the</strong> matrix A= 1 2 3 2 5 7 2 4 5 1 2 3 7 118 Encryption: *2 5 7 mod 31 mod 31 30283 2 4 517 219 25 represents <strong>the</strong> ciphertext,: [Z E O o ] 429Decryption: A = 1 <strong>and</strong> A -1 =Now, A -1 C = 3 4231 30 18 13 12 7 111INTERNATIONAL 6 JOURNAL 1 OF 24 ADVANCE 19 25 COMPUTER 36 111 TECHNOLOGY | VOLUME 2, NUMBER 3,5 26 14 23 8 35 11133 10 22 15 28 3 111 210 3 2 4 12 01* 1 41 29111 25 mod 3188

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!